Gray Pixel Value based Vein Feature Extraction and Recognition on FPGA

— The proposed paper presents a new technique in the authentication system in contactless palm vein biometric modality. This work is focused on improving the security and performance of a palm vein pattern recognition system. This work is dedicated to verifying an efficient and robust authentication system on a field-programmable gate array (FPGA). The proposed method is carrying at three different levels. (1) Palm vein image feature (Gray value) detection and extraction (2) A secrete key generation using16-bit Cyclic Redundancy check (CRC) checksum. (3) Realization and implementation of level (1) and (2) on FPGA. Level (3) describes the verification and validation of the palm vein features on FPGA. The state-of-the-art of the proposed work is to design and implement a 2-level palm vein authentication system (PVAS) by adapting CRC to ensure proper encoding and decoding of the data. The implementation result of PVAS on FPGA shows a faster time of 1.979000ns for data validation process and accuracy of 98.921%. The objective of the present work is to analyze and compare system performance on software and hardware platform. Finally, it observed from the result that CRC-16 is a highly secured algorithm for faster verification and validation of the system on FPGA.


I. INTRODUCTION
The fast growing technology and revolution in globalization of business, a strong reliable, high secure, authenticating system/human and for communication to carry valuable data in all sectors is very much necessary. For these purpose technology demands for a strong key/specialized system, that relays on safe transaction of data. One wellknown method of authentication of human beings as well as data securing is by using biometric system. Contactless palm vein biometric is an automated technique to identify an individual [1]- [3]. The goal of proposed work is to design, develop, and secure authentication system using the present and upcoming biometric technology. The present work mainly deals with authentication by using contactless palm vein pattern [8], as it provides a complex vein patterns. Our focus here is on improving the security and performance of palm vein pattern, which is a popular biometric cryptosystem [14], [17]. Palm vein pattern can effectively utilize the natural representation of palm vein minutiae, which is an unordered set [4], [9]. The work provides a 2-way protection to the authentication system. This technique provides, a high degree of accuracy, secure access, eco-friendly and new way of innovation.

II. RELAETD WORK
It is necessary to realize and implement on hardware platform in order to improve accuracy and time compare to the software platform [11]. Many researchers worked on PV image feature detection, image enhancement and classification [1]. Nevertheless, in my survey authentication system development on proposed work is very less. This method is very simple and more reliable. Some papers also discussed about the multimodal PVAS, but these works did not show much effective result because of longer duration for recognition since it involves two modes of feature extractions steps [10]. Therefore, it is better to choose single mode to speedup the recognition process and for more secure we are providing secret key, which will not take much time to execute. In the present novel method, introduction to hardware implementation will test the suitability of palm features on FPGA platform and test the percentage of palm vein features accuracy on hardware platform. A 16-bit secret key is introducing to make PVAS more reliable and powerful authentication system. The Palm vein minutiae and secrete key data process on hardware requires encoding and decoding steps. Here to ensure secure encoding and decoding operations an intensive CRC polynomial construction approach is adopting.
Our first work [13] developed is based on real-time image using a CMOS sensor and that has to be pre-processed, finally features extracted and matched. This work did not produce expected output in terms of thinning, edge detection due to improper image acquisition. Because of this, we have chosen PUT standard database from institute of Control and Information Engineering (CIE) Biometrics for research purpose. For our present work, the database of contactless palm vein is taken from the PUT database [19]. PUT Vein pattern database is freely available for research purposes used as common platform for analysis, to study and comparison of new segmentation and classification algorithms. Enabling comparison of algorithms check with or without different hardware systems used by researchers will help us to choose the best algorithm, thus helping in biometrics systems design also.

III. BACKGROUND
Palm vein pattern or structure is unique from one individuals to other [5]. This uniqueness makes vein recognition system to more reliable system among different biometric modalities. The palm vein features security is enhancing by adding some crypt key [16]. The images taken from the database will be an input for the system. Before feature extraction process, the images are subjected to pre-processing using several techniques (will be describing in the following sections) [2]. After preprocessing the feature extraction based on centre-line thinning and gray value threshold, palm vein valid minutia points are extracting. These extract points are in 2D form. First, this must be converting into 1D values and fusion with the secret key. These set of values are further evaluating on FPGA for validation of data. To ensure proper encoding and decoding, error-detecting techniques called CRC algorithm is employing here. This algorithm proved that is very efficient method for validation of data without appending any error at the decoding stage [1]- [3].

A.
CCITT -CRC A 16-bit CRC the CCITT (Committee Consultative International Tegraphique and Telephonique) has the polynomial x 16 + x 12 + x 5 + 1, that is used as a 16-bit CRC checksum. The CCITT-CRC does not impose any additional transmission overhead at the character level. The data is considered as a binary number. Both sender and receiver need to divide the data using the same divisor. Then the quotient is discarding and the remainder is considered as the CRC. If the received data is errorless, then the receiver's data will match the sender's data, and the CRC's will agree. This checksum will ensure a secure data transmission.

B.
Methodology The proposed novel approach is analyzing in two models: software model and hardware model as shown in Fig. 1. The software model will perform, image preprocessing and minutiae extraction process and hardware model will check the validity of the process. The complete flow of the proposed system is start with image preprocessing. Fig. 2 describes the preprocessing steps employed in the present work. After preprocessing the feature extraction process on enhanced image is applying. Once the features extracted then the secret key generation process will start. Finally, the fusion of feature extracted, secret key data, will be carried, and the fusion data should be encoded for verification. Since all authentication system must be test in real time application, it is necessary to check on embedded system. To do so, here we are implementing and checking the system performance on hardware to validate the system accuracy and efficiency. The encoding and decoding operation will be developing on FPGA(Xilinx). During encoding process, the secret key and palm vein features both combined and the resultant data is encoded. At the decoding process, the data checked for genuine user palm. If the password and features match with the excepted data then the authentication is accepted else, authentication will be declining.

C.
Palm Vein Preprocessing And Feature Extraction Preprocessing reduces the noisy and inconsistent data. This section consists of around maximum 25 pixels. Preprocessing will eliminates all unwanted pixels. Feature Extraction once the preprocessing is complete then the data is ready for feature detection and extraction process as shown in Fig. 3. The preprocessed image is well suited for feature extraction by removing of all noises present in the image. Palm vein feature detection and extraction process is a process of fine-tuning of the thinned image. Here we are using the crossing numbers approach as a feature-matching algorithm [12]. The algorithm operation is explaining in four steps.
1. First select a template of 3 x 3 pixels.
2. Next, using Euclidean distance find the pixels nearest Neighborhoods.
3. Find the overlapped pixels. If the number of overlapped pixels equals to two then that conveys beginning or end of the line. If the overlapped pixel equals to four and five then the bifurcation.
4. Pixels extracted from step 3 are considered as genuine minutiae points for authentication process.

D.
Creating Secret Key And Crypt The palm vein biometric systems are very hygienic and nonforgeable method. The method to develop such strong system involves creating secret key and efficient crypt [21]. The palm vein template acts as a key. In the current implementation, the secret key 'S' generate 128-bit random bit stream. Hence the vein authentication system posses the secret key 'S' and the key is locked by the unordered set ' ' from the vein pattern. The polynomial 'P' is possessed by encoding key 'S' and ' '. A crypt ' ' is developed by, The V will secure 'S' with palm vein features. The chaff point set ' ' conceals the true set from the opponent. Concealing true set secures the secret feature set of the vein and template 'T'. In order to unlock Vault ' ', a query template 'T 1 ' is used. The 'T 1 ' is constructed by another unordered set say ' 1 '. The polynomial P is effectively reconstruct by overlapping ' 1 ' with ' ', if both unordered set matches then the key is decoded.

E.
Template Creation In our work 'S' is considered as a data to be shield. The size of 'S' is based on system capacity. Here, we employed 8-bit length x and y coordinate values of the image feature extracted points as an image template (total length of template is 16-bit) is taken for locking/unlocking the vault.

IV. IMPLEMENTATION
The system implementations on FPGA, starts with an arrangement of image features that suit the translation and rotation between template and query feature data. Next, the encoding operation is carried to secure 'S' with palm vein feature data. If query features set similar to the template features set, then that indicates the authorized person presence and 'S' can be rebuild precisely. Appending the CRC bits to the original secret S (128-bits) and considerable image minutiae points of 16-bit from (x, y) coordinates of palm vein image total 144-bit data has been constructed as secrete CRC 'SC'.

A.
Encoding Process Steps Here the palm vein minutia has and secrete key values encoded. The following steps explain the encoding steps and realization of the system. (d) Vein pattern creation: The combination of chaff point and matrix coordinates forms the pattern. These patterns act as a secure template and therefore these values are stored in database.

B. Decoding Process
Steps Decoding process is for validation of the data. The following steps explain the process of decoding data.  The 600 left palm vein images from PUT Vein pattern database [18] is used to assess the proposed work. All palm images are 24-bit bitmap files with pixel dimensions of 1280x960 resolutions. For each individual, all sample images were acquired in 3 series and 4 pictures per series. The time interval between each series was at least one week. In his device, there were no additional positioning systems used because the alignment of the device is in such a way that the volunteers were asked to put his/her hand on the device to cover capturing window so the line below their fingers coincident with its edge. A.
Preprocessing Fig. 5 shows the simulation results of pre-processing and final minute extracted image result. Fig. 5(a) is the original image means that should be pre-processed. Images have been taken from the PUT standard palm vein database and cropped it for the region of interest 256*256 size. We can process an image without crop. Here to highlight the vein structure we have considered the cropped image. Fig. 5(b) depicts the image segmentation process of the palm image. Fig. 5(c) depicts the binarization process applied on Fig. 5(b) and Fig. 5(d) shows the noise elimination process applied to Fig. 5(c).  We also run these extracted features for recognition process in MAT LAB we got an accuracy of 98.16% and time taken for recognition out of 600 images is 1.235s as shown in table.1. For experimental purpose, we choose 600 images (only left hand of the persons) from the database.

B.
Simulation On FPGA 1. After pre-processing and feature extraction, a minimum 28 valid minutiae points are selected (here the threshold is 160 gray value. If minute value is greater than 160 that is considered as valid minute points) and the input secret text 16 character as a secret code is entered by the user. Later the implementation process starts by construction of polynomial for secret key. This process is simulating on Xilinx ISE Design Suite 13.2: Vertex®-7 tools 2. The secret code is of 16-bit length. Development of CRC-16 algorithm on FPGA proves that the proposed system works well in identifying the genuine palm data without any error. Fig. 7. explains the device utilization by the system. One thing we conclude from this summary is that since to build entire system on hardware it requires only few logic devices. This will makes the system to occupy less area here by achieving high speed and improving other performance parameters such as power, cost etc. Therefore, the total time taken to compelet the execution of the proposed system is 1.964ns that remarks the robustness of the system responds to an input which implemented on FPGA rather than Mat lab it takes 1.235s as mentioned in table. 1. The accuracy of the system build on FPGA is 98.921% out of 600 images as illustrated in table.1 and Fig. 8.

V1 CONCLUSION
A contactless palm vein feature extraction and realization on hardware platform is successfully tested and the best results are obtained. The system found effective and reliable when compare to the Matlab implementation. The system validation time found to be 0.964ns for proposed method when compared to 1.235s using Mat lab. Therefore, the system developed proves with a highly robust, high throughput of 1.964ns 2-level protection in terms of 16-bit secret key and the palm vein feature points matching.